• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Identity-based proxy multi-signature applicable to secure E-transaction delegations①

    2016-12-05 01:31:30LiuJianhua劉建華WuQianhongLiuJianweiShangTao
    High Technology Letters 2016年2期
    關(guān)鍵詞:劉建華

    Liu Jianhua (劉建華), Wu Qianhong, Liu Jianwei, Shang Tao

    (*Aviation Engineering Institute, Civil Aviation Flight University of China, Guanghan 618307, P.R.China) (**School of Electronics and Information Engineering, Beihang University, Beijing 100191, P.R.China)

    ?

    Identity-based proxy multi-signature applicable to secure E-transaction delegations①

    Liu Jianhua (劉建華)②*, Wu Qianhong**, Liu Jianwei**, Shang Tao**

    (*Aviation Engineering Institute, Civil Aviation Flight University of China, Guanghan 618307, P.R.China) (**School of Electronics and Information Engineering, Beihang University, Beijing 100191, P.R.China)

    To enhance the robustness of a proxy multi-signature scheme and improve its efficiency, a novel proxy signature paradigm is proposed referred to as identity-based proxy multi-signature (IBPMS). In this paradigm, multiple proxy signer candidates are employed to play a role of the single proxy signer in the existing model. A provably secure IBPMS scheme is presented which requires only one round broadcast operation. Performance analysis demonstrates that the new scheme outperforms the existing multi-signature schemes in robustness and communication. These properties are rendered to our IBPMS scheme as a more practical solution to secure e-transaction delegation applications of proxy signatures.

    multi-signature, E-transaction, delegation, provable security, information security

    0 Introduction

    Digital signature protocols allow message transmissions among a group of users with non-repudiation, user identification, and message authentication. Many variants of signatures such as blind signature[1], proxy signature[2], multi-proxy signature[3], and proxy multi-signature (PMS for short)[4]have been proposed to meet different application demands, among which, the proxy signature protocol is constructed to empower a signee to issue a message on behalf of another signee.

    Proxy multi-signature plays an critical role in the following scenarios. There may be real estate owned bym(m>1) entities, any legal transaction that wants to sell or rent out the assets must be permitted by all themowners. In other words, it must be signed jointly by all the entities, or signed by their designated proxy signers. For the latter case, any transaction of the real estate needs to be executed with the permission issued by all the owners’ proxy signers. One practical solution to the problem is to allow multiple proxy signers in a proxy multi-signature, each owner has his/her own proxy signer.

    The PMS scheme[5]needs only one round broadcast operation for each original signer during the proxy key generation phase. The proxy multi-signature schemes in Refs[4-6] do not provide formal definition or security model. Cao et al. proposed an ID-based proxy multi-signature scheme which used bilinear pairings[7].

    The existing PMS schemes (e.g., Ref.[5-9]) only allow one proxy signer candidate. This limitation may incur a bottleneck to the PMS schemes in some applications. Multi-proxy multi-signature[10,11]allow multiple original signer to delegate their signing capability to a group of proxy signers. Consider a scenario where a real estate owned by multiple owners needs to be rent out or sold. Suppose the owners delegate their signing capability to some proxy signers. If there is only one single proxy signer allowed to sign on behalf of the owners, then the single proxy signer’s relationships with the owners are different from each other. He/She may issue some transaction documents which will meet some owners’ interests but damage the interests of other owners. To address the drawback, a plausible solution is to allow the owners to choose their own proxy signers, any owner can designate a proxy signer. A transaction document is legal if and only if all the proxy signers sign on it. Another issue in existing PMS schemes is their communication complexity. Each original signer needs two-round broadcast operations. It’s critical to reduce the number of interaction rounds.

    Contribution of the study: Motivated by the above observations and the work of Ref.[12], this work revisits proxy multi-signatures. The contribution consists of two folds. First, a general framework to identity-based proxy multi-signature (IBPMS) is presented. In IBPMS, the original signers of a group are allowed to transfer their signing rights to a group of proxy signer candidates and any proxy signer candidate can sign a document on behalf of all the original signers alone. Second, an IBPMS scheme is proposed which is provably secure under standard computational assumptions. A striking feature of the IBPMS scheme is that it demands only one time of broadcasting operation for each original signer during the proxy key generation phase.

    The rest of this paper is organized as follows. Some background knowledge associated with the work is given in Section 1. The outline of the proxy multi-signature scheme and security model are given in Section 2. In Section 3, a proxy multi- signature scheme from bilinear pairing is presented. Its formal security proofs will be given in Section 4. In Section 5, the efficiency of the proposed scheme is compared with some related work. conclusion is given in Section 6.

    1 Syntax

    In the conventional proxy signature definition, a proxy signer can sign a message on behalf of an original signer under the delegation of the original signer. In Ref.[13], Huang, et al. proposed a security model of a proxy signature scheme. This model is the most widespread used one for the security analysis. A delegation usually is produced by the original signer through an algorithm whose inputs are private key and a certain message. Therefore, a delegation can be seen as a special signature signed by the original signer(In most cases, it is a signature on a warrant).

    Usually, there is only a single proxy signer in a PMS scheme[5-8]. All the original signers delegate their signing capability to one proxy signer. If the designated proxy signer is unavailable for something unexpected, then the protocol will be collapsed. Therefore, the proxy signer may be a bottleneck of a PMS scheme. One efficient solution to reduce the bottleneck effect is to increase the number of proxy signers and each proxy signer can sign a message on behalf of all the original signers separately.

    1.1 Protocol variables and member relationship

    Traditional proxy multi-signature[7]is a type T2scheme, a traditional multi-proxy signature scheme[3]is a type T4scheme, a (t,n) threshold proxy signature schemes[14]is a type T4scheme.

    1.2 Bilinear parings

    The bilinear map can be constructed by suitable modification in Weil[15]or Tate pairings[16]. The group equipped with such a map is called a bilinear group, on which the Decisional Diffie-Hellman problem is able to be solved within a polynomial-time while the computational Diffie-Hellman problem is believed hard[17].

    2 Modelling identity-based proxy multi-signature

    Inspired by the works of Cao, et al.[7], Wang, et al.[18], and Rajeev, et al.[8], and Pointcheval[19], a formal definition and security model for identity-based proxy multi-signature schemes are given.

    2.1 Definition of identity-based proxy multi-signature schemes

    In an identity-based proxy multi-signature scheme, the original signers of a group are allowed to transfer their signing rights to a group of proxy signer candidates, in such a way that any proxy signer candidate can sign a document on behalf of all the original signers alone. LetA1,A2,…,Ambe the original signers andB1,B2,…,Bnbe the proxy signer candidates designated byA1,A2,…,Am. For 1≤i≤m, Aihas an identity IDAi, for 1≤j≤n,Bjhas an identity IDBj.

    Definition 1 An identity-based proxy multi-signature scheme is a tuple IBPMS=(Setup; Extract; Sign; Veri; PMGen; PMSign; PMVeriT).

    Setup: On the input security parameterl, PKG generates public parametersParaof the system and a master secret keys. PKG publishesParaand keeps confidential master keys.

    Extract: Input master secret keys, public parametersParaand an identityID, and output the private keySIDofID. PKG will use this algorithm to generate private keys for all entities participating in the scheme and send the private keys to their respective owners through a secure channel.

    PMGen: This is a protocol jointly executed by all the candidate proxy signers and all original signers. Input IDA1,…,IDAm,IDB1,…,IDBn, the original signers’ private keys SIDA1,…,SIDAmand the delegation warrant ω which includes the type of the information delegated, the period of delegation, all the candidate proxy signers, etc. Any candidate proxy signerBj(j=1,…,n) can output a proxy signing key skBjby inputting his secret key SIDBj. The proxy signing key skBjcan be used byBjto produce proxy multi-signature on behalf of the original signers.

    2.2 Security model

    A formal security model for an identity-based proxy multi-signature scheme based on the work of Refs[7,8,20] is given. It is considered that adversary A tries to forge a proxy multi-signature working against a single honest user 1. User 1 can be an original signer or a proxy signer adaptively. A is allowed to access standard signing oracle, delegation oracle, and proxy multi-signature oracle.

    The goal of adversary A is to produce one of the following forgeries:

    Consider the following game:

    (1) Setup: The challenger runs the algorithm Setup of the proxy multi-signature scheme and provides the public parametersParato A.

    (2) Hash query: A can access the hash oracle, challenger X responds through the hash oracle and maintains LH1, LH2and LH3for each hash query.

    (3) Extract query: Adversary A can ask for the private key of any user IDi(IDi≠ID1). The challenger responds by running the Extract algorithm and returns the private key SIDito A.

    (5) Delegation query: A is allowed to request for the proxy signing key on the warrant ω and the identity IDi(IDi≠ID1). The user 1 may be either one of the original signers or one of the proxy signers.

    Definition 2 ID-based proxy multi-signature forger A (t,qH,qE,qs,qps,qpms,m+n,ε)-breaks them+nusers ID-based proxy multi-signature scheme by the adaptive chosen message and givenIDattack if: A runs in time at mostt, and A makes at mostqHqueries to the hash queries, at mostqEqueries to the extraction queries, at mostqsqueries to the signing queries, at mostqpsqueries to the delegation queries and at mostqpmsqueries to the proxy multi-signature queries, and the success probability of A is ε at least.

    Definition 3 An ID-based proxy multi-signature scheme is (t,qH,qE,qs,qps,qpms,m+n,ε)-secure against adaptive chosen message and givenIDattack, if there is no adversary who can (t,qH,qE,qs,qps,qpms,m+n,ε)-break it.

    3 Proposed identity-based proxy multi- signature scheme

    In this section, an identity-based proxy multi-signature (IBPMS for short) scheme is presented based on the ID-based aggregate signature scheme[12]and IBPMS scheme[8]. The scheme has following phases: Setup, Extract, Sign, Veri, PMGen, PMSign, PMVeri.

    Extract: For a user withID, PKG computes its public key as QID=H1(ID)∈G1and private key asSID=sQID. Thus original signerAi, has its public key QAi(for i=1,…,m) and corresponding private key SIDAi. Similarly, for thenproxy signers, the public keys are QIDBjand corresponding private keys are SIDBj(forj=1,…,n).

    The Sign and Veri algorithm above is the same algorithm as the Shim’s IBS scheme[12], and for short the Shim’s IBS scheme is denoted as SIBS.

    PMGen: In this phase, the original signers perform the following job to make a message warrant ω, jointly with the proxy signers. ω includes some specific information about the message, restrictions on the message, time of delegation, identity of original and proxy signers, period of validity, and so on. Unlike the traditional proxy multi-signature schemes, the warrant ω in our scheme will declare a proxy signer group {Bj|1≤j≤n}, any Bjcan sign a message on the behalf of the original signers {Ai|1≤i≤m}.

    WBj=skBj+xjh4Ppub

    2. Checks whether or not the proxy signerBjis on the authorized list in the warrant ω. If not, stop. Otherwise, continue.

    Our PMS scheme allowsncandidates of proxy signingB1,…,Bn. Ifn=1, then our PMS scheme is a traditional PMS scheme, namely a T2proxy signature scheme; Ifn>1, then the PMS scheme is a T5proxy signature scheme.

    If set the number of proxy signersn>1 in the PMS scheme, and use the PMS scheme to be a traditional PMS scheme, that is to say, a message can be checked as valid when one of the proxy signers signs on it. In this situation, the proposed PMS scheme enjoys better robustness than a traditional PMS scheme, because, a traditional PMS scheme will not work if the unique proxy signer is not available. Thus a T5scheme enjoys better robustness than a T2scheme if a message needs only one proxy signer to sign on it.

    An e-transaction application instance: Suppose there is a real estate owned by multiple entities needed to be sold out. The owners authorize proxy signers to sign e-transaction documents. If there is only one single proxy signer allowed to sign messages on behalf of all the owners, then how to choose the single proxy signer admitted by all owners is another open problem. The relationship between the single proxy signer and ownerAiis different from that between the single proxy signer and owner Aj(i≠j). By using the proposed PMS scheme, each owner is allowed to choose her/his own proxy signer, thenmoriginal signers havenproxy signers, therem=n. Any e-transaction document can be verified as valid only if all thenproxy signers sign on it. The whole process containsmtimes PMSign signing andmtimes PMVeri verifying.

    4 Analysis of the scheme

    4.1 Correctness

    1. The correctness of delegation process:

    2. The correctness of PMSign and PMVeri algorithms from the following equalities:

    4.2 Security proof

    ε≥e(qE+1)·(1+(1-1/(qE+1))qpms)

    +(1-1/(qE+1))qs+qps+qpms)-1ε’

    t≤t’-CG1(qH1+qH2+qH3+qH4+2qE

    +3qs+3qps+3qpms+9)

    whereeis the base of natural logarithms, and CG1is the time of computing a scalar multiplication and inversion onG1.

    Proof. Suppose adversary (t,qH,qE,qs,qps,qpms,m+n,ε)-breaks the proxy multi-signature scheme. X is given X=xP and Y=yP. Its goal is to output xY=xyP. X interacts with A as follows:

    Setup: Algorithm X initializes A withPpub=Xas a system’s master public key. A selects an identityID1.

    H1-queries: At any time A can query the random oracle OH1. To respond to these queries, X maintains a list LH1of tuples (IDi,Qi,bi,ci) . When an identityIDiis submitted to the OH1, X responds as follows:

    (1) If the queryIDialready appears on the list LH1in some tuple (IDi,Qi,bi,ci), then algorithm X responds withH1(IDi)=Qi.

    (2) Otherwise, X generates a random coin c∈{0,1} such that Pr[c=0]=λ.

    (4) Algorithm X adds the tuple (IDi,Qi,bi,ci) to the list LH1and responds to A withH1(IDi)=Qi.

    H2-queries: A can query the random oracle OH2. X maintains a list LH2of tuples (ωi,vi). When a warrant ωiis submitted to the OH2, X responds as follows:

    (1) If the query ωialready appears on the list LH2in some tuple (ωi,vi) then algorithm X responds with H2(ωi)=vi.

    H3-queries: At any time A can query the random oracle OH3with (ω,V). X maintains a list LH3of tuples (ω,V,η). X responds as follows:

    Extraction queries: Let IDi(i≠1) be a private key extraction query issued by algorithm A.

    (1) X runs the above algorithm for responding toH1-queries to obtain a Qi∈G1such that H1(IDi)=Qi. Let (IDi,Qi,bi,ci) be the corresponding tuple on the list LH1. Ifci=0, then X outputs “failure” and terminates.

    (2) Otherwiseci=1 and Qi=biP. Define SIDi=biPpub. It is seen that SIDi=bixP=xQiand therefore SIDiis the private key associated with the public keyIDi. Returns SIDi. The probability of success is 1-λ.

    Delegation queries:

    Case 2: A requests to interact withID1, whereID1plays the role of one of the original signers. To responds to this query, A generates a warrant ω, and requestsID1to sign ω and receives a response (WA1,VA1,ω). X returns a partial proxy signing key skBjwhich involves (WA1,VA1,ω) and adds ((WA1,VA1),…,(WAm,VAm),ω,skBj) to Lpso.

    Hence the above provided proxy signing key which involves (WAi,VAi) is valid. The probability of success is 1-λ.

    (2) X runs the above algorithm for responding toH2-queries on ω, recovers (ω,v) on LH2list.

    (3) Ifc= 0, then X returns “failure” and terminates. Ifc=1, H1(IDAi)=bAiP or H1(IDBj)=bBjP.

    Hence, the probability thatCdoes not abort during the simulation is (1-λ)qE+qps+qpms.

    Output: If X does not terminate as a result of A’s extraction query and proxy multi-signature query, then A’s view is identical to its view in the real attack.

    And it holds that

    X succeeds if all of these events happen.

    Pr[E1∧E2∧E3]

    =Pr[E1]Pr[E2|E1]Pr[E3|E1∧E2].

    Since A makes at mostqEqueries to the Extraction oracle and Pr[c=1]=1-λ, then Pr[E1]=λ(1-λ)qE. If X does not abort as a result of A ’s Extraction query then A ’s view is identical to its view in the real attack. Hence, Pr[E2|E1]≥ε. X will abort only if A generates a forgery such thatc=1. Hence, Pr[E3|E1∧E2]≥1/(1-λ). Thus, the probability of success is at least λ(1-λ)qEε.

    Hence the success probability that X solves the CDHP in the above game is at least:

    ((1-λ)qE+(1-λ)qE+qpms+(1-λ)qE+qs+qps+qpms)λε Set λ=1/(qE+1), we can deduce that

    ((1-1/(qE+1))qE+(1-1/(qE+1))qE+qpms+(1-1/(qE+1))qE+qs+qps+qpms)1/(qE+1)ε≥(1/e)·1/(qE+1)·(1+(1-1/(qE+1))qpms+(1-1/(qE+1))qE+qs+qps+qpms)ε≥ε′.

    Therefore

    ε≥e(qE+1)·(1+(1-1/(qE+1))qpms

    +(1-1/(qE+1))qE+qs+qps+qpms)-1ε′

    For the running time, one can observe that the running time of X is the same as A running time plus the time taken to respond to qH1,qH2,qH3,qH4hash queries,qEextraction queries,qssigning queries,qpsdelegation queries andqpmsproxy multi-signature queries, and the time to transform A ’s final forgery into the CDH solution. Hence, the total running time is at most t+CG1(qH1+qH2+qH3+qH4+2qE+3qs+3qps+3qpms+9)≤t′ as required.

    5 Comparison

    The efficiency of the scheme is compared with the schemes in Refs[6-8]. In Table 1,Edenotes the exponentiation operation inG2,Mdenotes the point scalar multiplication operation inG1,Pdenotes the pairing operation and NoPS denotes the number of proxy signer candidates. The broadcasting round in which each original signer needs to execute in the PMGen is denoted by BREO.

    Table 1 Performance analysis

    From Table 1, it can be seen that the proposed scheme is more efficient than the schemes in Refs[6-8]. Especially, the PMS scheme demands only one round broadcasting operation for each original signer, and the proxy signer candidates is not unique. These two characteristics make our PMS scheme more practical and efficient than the other schemes. It is supposed a valid message only needs the signature of one of the proxy signers.

    6 Conclusion

    In this work, a novel proxy multi-signature scheme is presented. The proposed proxy multi-signature scheme demands only one round broadcasting operation for each original signer during the proxy key generation phase. The scheme allows multiple proxy signers, improves the reliability of the PMS scheme. A formal security proof for the proposed scheme is also proposed.

    [1] Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. In: Proceeding of the Public Key Cryptography, Miami, USA, 2003. 31-46

    [2] Mambo M, Usuda K, Okamoto E. Proxy signature: delegation of the power to sign messages.IEICETransactionsonFundamentalsofElectronicsCommunications&ComputerSciences, 1996, E79-A(9):1338-1353

    [3] Cao F, Cao Z F. A secure identity-based multi-proxy signature scheme.ComputersandElectricalEngineering,2009, 35:86-95

    [4] Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme.ElectronicsLetters, 2000, (36):527-528

    [5] Li X X, Chen K F, Li S Q. Multi-proxy signature and proxy multi-signature schemes from bilinear pairings. In: Proceedings of the 5th International Conference on Parallel and Distributed Computing, Application and Technologies, Singapore, 2004, 2004.591-595

    [6] Li X X, Chen K F. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings.AppliedMathematicsandComputation, 2005,169(1):437-450

    [7] Cao F, Cao Z. A secure identity-based proxy multi-signature scheme.InformationSciences, 2009, 179(3):292-302

    [8] Rajeev A S, Sahadeo P. Efficient ID-based proxy multisignature scheme secure in random oracle.FrontiersofComputerScience, 2012, 6(4):421-428

    [9] Du H, Wen Q. Certificateless proxy multi-signature.InformationSciences, 2014, 276:21-30

    [10] Asaar M R, Salmasizadeh M, Susilo W. An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants.ComputerJournal, 2013,58(4):1021-1039

    [11] Sahu R A, Padhye S. Identity-based multi-proxy multisignature scheme provably secure in random oracle model.TransactionsonEmergingTelecommunicationsTechnologies, 2015,26(4):547-558

    [12] Shim K. An ID-based aggregate signature scheme with constant pairing computations.TheJournalofSystemsandSoft-ware, 2010, 83:1873-1880

    [13] Huang X Y, Mu Y, Willey S, et al. Proxy signature without random oracles. In: Proceedings of the Mobile ad-hoc and Sensor Networks, Hong Kong, China, 2006. 473-484

    [14] Zhang K. Threshold proxy signature schemes.LectureNotesinComputerScience, 1997, 1396: 191-197

    [15] Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proceedings of the Crypto, Santa Barbara, USA, 2001. 213-229

    [16] Miyaji A, Nakabayashi M, Takano S. New explicit conditions of elliptic curve traces for fr-reduction.IEICETransactionsonFundamentals, 2001, 5:1234-1243

    [17] Okamoto T, Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. In: Proceedings of the Public key Cryptopraphy, Cheju Island, Korea, 2001. 104-118

    [18] Wang Q, Cao Z, Wang S. Formalized security model of multiproxy signature schemes. In: Proceedings of the 5th International Conference on Computer and Information Technology, Shanghai, China, 2005. 668-672

    [19] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures.JournalofCryptology, 2000, 13:361-396

    [20] Shao Z. Improvement of identity-based proxy multi-signature scheme.JournalofSystemsandSoftware, 2009, 85:794-800

    Liu Jianhua, born in 1983. He received his Ph.D degrees in School of Electronic and Information Engineering of Beihang University in 2013. He also received his B.S. and M.S. degrees from China West Normal University in 2006 and 2009 respectively. His research interests include information security.

    10.3772/j.issn.1006-6748.2016.02.012

    ①Supported by the National Basic Research Program of China (No. 2012CB315905), the National Natural Science Foundation of China (No. 61272501), the Fund of Tianjin Key Laboratory of Civil Aircraft Airworthiness and Maintenance in CAUC and a General grant from Civil Aviation Flight University of China (No. J2013-31, Q2014-48).

    ②To whom correspondence should be addressed. E-mail: ljh2583265@163.comReceived on Aug. 22, 2015

    猜你喜歡
    劉建華
    學(xué)走鋼絲的樂樂羊
    凡事無絕對
    你不知道的“胡”“番”“?!薄把蟆?/a>
    有趣的“兒化”
    摘蘋果
    幼兒園(2020年17期)2020-12-30 12:22:50
    “灬”表示什么
    大雪人
    大白鵝
    搟面條
    掉鞭炮
    国产91精品成人一区二区三区 | 国产成人啪精品午夜网站| 十八禁网站免费在线| 丝袜美腿诱惑在线| 亚洲伊人久久精品综合| 女人爽到高潮嗷嗷叫在线视频| 一区二区三区激情视频| 男女床上黄色一级片免费看| 在线观看免费日韩欧美大片| 婷婷丁香在线五月| 曰老女人黄片| 80岁老熟妇乱子伦牲交| 啪啪无遮挡十八禁网站| 一级毛片电影观看| 欧美激情久久久久久爽电影 | 亚洲性夜色夜夜综合| 免费在线观看黄色视频的| 一本—道久久a久久精品蜜桃钙片| 日本vs欧美在线观看视频| 一个人免费看片子| 亚洲成av片中文字幕在线观看| 91av网站免费观看| av超薄肉色丝袜交足视频| 一区二区av电影网| 成人18禁高潮啪啪吃奶动态图| 国产99久久九九免费精品| 日日摸夜夜添夜夜添小说| 精品高清国产在线一区| 亚洲熟女毛片儿| 天天躁狠狠躁夜夜躁狠狠躁| 91成年电影在线观看| 亚洲av日韩在线播放| 男人操女人黄网站| 2018国产大陆天天弄谢| 午夜福利视频精品| 老司机影院成人| 亚洲精品成人av观看孕妇| 国产老妇伦熟女老妇高清| 亚洲熟女毛片儿| 亚洲精品一二三| 日韩人妻精品一区2区三区| 亚洲综合色网址| 国产精品久久久久成人av| 新久久久久国产一级毛片| 久久久国产精品麻豆| 最黄视频免费看| 亚洲欧洲日产国产| 黄网站色视频无遮挡免费观看| 国产精品久久久人人做人人爽| 亚洲av欧美aⅴ国产| 成人三级做爰电影| 欧美日韩av久久| 日韩视频在线欧美| cao死你这个sao货| 国产成人啪精品午夜网站| 亚洲午夜精品一区,二区,三区| 搡老岳熟女国产| 国产亚洲精品久久久久5区| 99久久精品国产亚洲精品| 热re99久久国产66热| 成年av动漫网址| 五月开心婷婷网| 国产极品粉嫩免费观看在线| 一本久久精品| 在线观看免费视频网站a站| 人人妻人人爽人人添夜夜欢视频| 性色av乱码一区二区三区2| 三级毛片av免费| 欧美精品av麻豆av| 亚洲国产精品一区三区| 精品国产乱子伦一区二区三区 | 美女视频免费永久观看网站| 亚洲国产成人一精品久久久| 嫩草影视91久久| 美女高潮到喷水免费观看| 日韩欧美免费精品| 久久久久国内视频| 黄色片一级片一级黄色片| 老司机午夜十八禁免费视频| 脱女人内裤的视频| 午夜免费成人在线视频| 国产福利在线免费观看视频| 久久人人爽av亚洲精品天堂| 999精品在线视频| 亚洲久久久国产精品| 久久久久国内视频| 啦啦啦在线免费观看视频4| 久久久久久久国产电影| 叶爱在线成人免费视频播放| 欧美中文综合在线视频| 九色亚洲精品在线播放| 精品少妇黑人巨大在线播放| 桃花免费在线播放| 黄色视频在线播放观看不卡| 久久精品国产亚洲av香蕉五月 | 免费女性裸体啪啪无遮挡网站| 国产精品亚洲av一区麻豆| 高清欧美精品videossex| 国产日韩欧美在线精品| a在线观看视频网站| 精品第一国产精品| 18禁观看日本| 国产福利在线免费观看视频| 国产日韩一区二区三区精品不卡| 午夜精品国产一区二区电影| 叶爱在线成人免费视频播放| 国产精品欧美亚洲77777| 亚洲欧美日韩另类电影网站| 免费在线观看完整版高清| 国产欧美日韩一区二区精品| 十分钟在线观看高清视频www| 精品一区在线观看国产| 丝袜脚勾引网站| 国产一级毛片在线| 成年动漫av网址| 久久久国产精品麻豆| 亚洲av男天堂| 一二三四在线观看免费中文在| 久久精品aⅴ一区二区三区四区| 亚洲av日韩在线播放| 男女高潮啪啪啪动态图| 纯流量卡能插随身wifi吗| 90打野战视频偷拍视频| 熟女少妇亚洲综合色aaa.| 97精品久久久久久久久久精品| 欧美激情 高清一区二区三区| 国产一区二区三区av在线| √禁漫天堂资源中文www| 高清欧美精品videossex| 久久人人爽人人片av| 999久久久精品免费观看国产| 午夜免费观看性视频| 91av网站免费观看| 国产成人影院久久av| 一进一出抽搐动态| 丝瓜视频免费看黄片| 波多野结衣av一区二区av| 国产精品二区激情视频| 1024视频免费在线观看| 欧美少妇被猛烈插入视频| 精品高清国产在线一区| 在线观看www视频免费| 成人av一区二区三区在线看 | 操美女的视频在线观看| 少妇猛男粗大的猛烈进出视频| 三上悠亚av全集在线观看| 久久久国产欧美日韩av| 亚洲av电影在线进入| 人人妻人人澡人人看| 精品一区在线观看国产| 美女国产高潮福利片在线看| 免费黄频网站在线观看国产| 女人久久www免费人成看片| 国产熟女午夜一区二区三区| 亚洲av片天天在线观看| 新久久久久国产一级毛片| 90打野战视频偷拍视频| 99精品久久久久人妻精品| 日日爽夜夜爽网站| 久久久久久久大尺度免费视频| 99国产精品免费福利视频| 电影成人av| 性少妇av在线| 色婷婷久久久亚洲欧美| 高清视频免费观看一区二区| 18禁裸乳无遮挡动漫免费视频| 精品福利观看| 久久精品人人爽人人爽视色| 久久久精品94久久精品| 欧美 日韩 精品 国产| 免费女性裸体啪啪无遮挡网站| 欧美精品av麻豆av| 国产一区有黄有色的免费视频| 中国美女看黄片| 窝窝影院91人妻| 久久久国产欧美日韩av| 国产熟女午夜一区二区三区| 一边摸一边抽搐一进一出视频| a级片在线免费高清观看视频| 国产极品粉嫩免费观看在线| 秋霞在线观看毛片| 国产有黄有色有爽视频| 亚洲国产精品一区三区| 国产xxxxx性猛交| 91国产中文字幕| 亚洲av成人一区二区三| 亚洲成人国产一区在线观看| 亚洲伊人久久精品综合| 婷婷成人精品国产| 天天操日日干夜夜撸| 精品少妇久久久久久888优播| 精品亚洲成a人片在线观看| 亚洲精华国产精华精| xxxhd国产人妻xxx| 国产又爽黄色视频| 亚洲人成电影免费在线| 老熟妇乱子伦视频在线观看 | 国产亚洲午夜精品一区二区久久| 纯流量卡能插随身wifi吗| 满18在线观看网站| av国产精品久久久久影院| 国产在线观看jvid| 国产欧美日韩综合在线一区二区| 久久久久国产精品人妻一区二区| 国产有黄有色有爽视频| 免费一级毛片在线播放高清视频 | 国产日韩欧美在线精品| 老鸭窝网址在线观看| 一区二区三区四区激情视频| 欧美变态另类bdsm刘玥| 成人国产av品久久久| videos熟女内射| 亚洲av国产av综合av卡| 99久久99久久久精品蜜桃| 精品人妻在线不人妻| 久9热在线精品视频| 国产精品久久久久成人av| 中文字幕人妻丝袜一区二区| 18禁裸乳无遮挡动漫免费视频| 性色av一级| 91av网站免费观看| 美女福利国产在线| 欧美黄色片欧美黄色片| 国产亚洲欧美精品永久| 极品少妇高潮喷水抽搐| 久久精品久久久久久噜噜老黄| 一边摸一边抽搐一进一出视频| 国产三级黄色录像| 91大片在线观看| 国产亚洲精品第一综合不卡| 别揉我奶头~嗯~啊~动态视频 | 欧美成狂野欧美在线观看| 夜夜骑夜夜射夜夜干| 人妻一区二区av| 最新在线观看一区二区三区| 在线亚洲精品国产二区图片欧美| a在线观看视频网站| 一区二区三区乱码不卡18| 18禁国产床啪视频网站| 大片电影免费在线观看免费| 97在线人人人人妻| 国产极品粉嫩免费观看在线| 日韩一区二区三区影片| 亚洲黑人精品在线| 亚洲av成人一区二区三| 国产在线免费精品| 黄色怎么调成土黄色| 精品一区二区三卡| 一本色道久久久久久精品综合| 欧美成人午夜精品| 电影成人av| 99九九在线精品视频| 欧美老熟妇乱子伦牲交| 免费久久久久久久精品成人欧美视频| 涩涩av久久男人的天堂| 亚洲熟女精品中文字幕| 一区二区三区激情视频| 满18在线观看网站| 国产精品久久久久成人av| 国产三级黄色录像| 久久99热这里只频精品6学生| 精品人妻在线不人妻| 国产成人免费观看mmmm| 亚洲 国产 在线| 久久精品成人免费网站| a级毛片黄视频| 国产免费现黄频在线看| 久久热在线av| 欧美变态另类bdsm刘玥| www.精华液| 十八禁高潮呻吟视频| 久久性视频一级片| 一级a爱视频在线免费观看| 国产av精品麻豆| 免费在线观看日本一区| 黄片小视频在线播放| 大码成人一级视频| 在线观看人妻少妇| 极品人妻少妇av视频| 精品国产超薄肉色丝袜足j| 精品福利永久在线观看| 欧美国产精品va在线观看不卡| 五月开心婷婷网| 黑人欧美特级aaaaaa片| avwww免费| 国产区一区二久久| 亚洲少妇的诱惑av| 99久久国产精品久久久| 亚洲精品在线美女| 国产黄频视频在线观看| 亚洲熟女毛片儿| 欧美精品人与动牲交sv欧美| 国产精品久久久久久精品电影小说| 黄色视频,在线免费观看| 亚洲精品久久午夜乱码| 91精品三级在线观看| 男女高潮啪啪啪动态图| 男女无遮挡免费网站观看| 亚洲伊人久久精品综合| 国产精品影院久久| 国产一区二区在线观看av| 亚洲三区欧美一区| 中国美女看黄片| 亚洲一区中文字幕在线| 男女下面插进去视频免费观看| 精品国产国语对白av| 亚洲精品粉嫩美女一区| 中文字幕av电影在线播放| 国产91精品成人一区二区三区 | 一二三四在线观看免费中文在| 天堂中文最新版在线下载| 大片免费播放器 马上看| 中文字幕人妻丝袜一区二区| 黄色a级毛片大全视频| 80岁老熟妇乱子伦牲交| 丰满人妻熟妇乱又伦精品不卡| 精品人妻1区二区| 天堂中文最新版在线下载| 国产精品免费大片| 侵犯人妻中文字幕一二三四区| 精品一区二区三卡| 这个男人来自地球电影免费观看| 免费av中文字幕在线| 国产成人欧美| 久久国产精品大桥未久av| 熟女少妇亚洲综合色aaa.| 亚洲精品国产区一区二| 国产精品自产拍在线观看55亚洲 | 国产免费现黄频在线看| 大码成人一级视频| 亚洲中文字幕日韩| 国产一区二区激情短视频 | 午夜影院在线不卡| 国产色视频综合| 一本久久精品| 亚洲国产精品999| 国产成人欧美在线观看 | 老司机福利观看| 天天躁狠狠躁夜夜躁狠狠躁| 成年女人毛片免费观看观看9 | 中文字幕精品免费在线观看视频| 久久人妻熟女aⅴ| 亚洲精品国产av成人精品| 黑丝袜美女国产一区| 午夜福利视频精品| 国产男女超爽视频在线观看| 国产免费一区二区三区四区乱码| 亚洲人成77777在线视频| 亚洲中文日韩欧美视频| 午夜福利在线免费观看网站| 亚洲av成人一区二区三| 久久中文字幕一级| 欧美久久黑人一区二区| 国产在视频线精品| 丰满少妇做爰视频| 女人高潮潮喷娇喘18禁视频| av有码第一页| 国产一区二区在线观看av| 妹子高潮喷水视频| 男人操女人黄网站| 999久久久国产精品视频| av福利片在线| 国产精品影院久久| 国产精品亚洲av一区麻豆| 国产野战对白在线观看| 最新在线观看一区二区三区| 免费少妇av软件| 一本色道久久久久久精品综合| 国产福利在线免费观看视频| 777久久人妻少妇嫩草av网站| 老鸭窝网址在线观看| 九色亚洲精品在线播放| 黄片大片在线免费观看| 每晚都被弄得嗷嗷叫到高潮| 99热国产这里只有精品6| 老司机靠b影院| 如日韩欧美国产精品一区二区三区| 亚洲熟女毛片儿| 国产黄频视频在线观看| 成人av一区二区三区在线看 | 亚洲成国产人片在线观看| 国产黄色免费在线视频| 欧美精品av麻豆av| 日韩一区二区三区影片| 免费高清在线观看日韩| 色视频在线一区二区三区| 一二三四社区在线视频社区8| 久久ye,这里只有精品| kizo精华| 人人澡人人妻人| 亚洲男人天堂网一区| 午夜免费鲁丝| av有码第一页| 一本综合久久免费| 男女免费视频国产| 亚洲精品第二区| a在线观看视频网站| 丰满饥渴人妻一区二区三| 一区二区三区精品91| 久久久久久免费高清国产稀缺| 成人黄色视频免费在线看| 美女视频免费永久观看网站| 久久精品久久久久久噜噜老黄| 丝瓜视频免费看黄片| 日本一区二区免费在线视频| 十八禁高潮呻吟视频| 少妇的丰满在线观看| 亚洲第一av免费看| 伦理电影免费视频| 国产一区二区三区综合在线观看| 在线观看免费高清a一片| 黑丝袜美女国产一区| 亚洲精品国产av成人精品| 狠狠狠狠99中文字幕| 成年人午夜在线观看视频| 一级,二级,三级黄色视频| 黑人巨大精品欧美一区二区mp4| 久久精品亚洲av国产电影网| 天天躁夜夜躁狠狠躁躁| 两人在一起打扑克的视频| 日本91视频免费播放| 人妻久久中文字幕网| 美女午夜性视频免费| 久久久久国产一级毛片高清牌| 欧美97在线视频| 高清av免费在线| 午夜福利乱码中文字幕| 青青草视频在线视频观看| 亚洲精品国产精品久久久不卡| 99国产精品99久久久久| 日本a在线网址| 老熟妇乱子伦视频在线观看 | 青青草视频在线视频观看| 十八禁网站免费在线| 亚洲精品av麻豆狂野| 久久女婷五月综合色啪小说| 欧美乱码精品一区二区三区| 午夜久久久在线观看| 美女中出高潮动态图| 高清在线国产一区| 日本黄色日本黄色录像| 精品卡一卡二卡四卡免费| 日本a在线网址| 亚洲专区国产一区二区| 国产一区二区三区av在线| 成人国产一区最新在线观看| 婷婷丁香在线五月| 久久毛片免费看一区二区三区| 淫妇啪啪啪对白视频 | 精品一区二区三区av网在线观看 | 亚洲av欧美aⅴ国产| 丰满饥渴人妻一区二区三| 亚洲人成电影免费在线| 国产精品久久久av美女十八| 丰满人妻熟妇乱又伦精品不卡| 亚洲成av片中文字幕在线观看| 91精品伊人久久大香线蕉| 狠狠婷婷综合久久久久久88av| 国产精品99久久99久久久不卡| 欧美精品一区二区免费开放| 十八禁高潮呻吟视频| 熟女少妇亚洲综合色aaa.| 免费在线观看完整版高清| 精品高清国产在线一区| 大型av网站在线播放| a级毛片黄视频| 国产精品偷伦视频观看了| 久久人人97超碰香蕉20202| 精品久久蜜臀av无| 亚洲,欧美精品.| 亚洲中文日韩欧美视频| 天天操日日干夜夜撸| 动漫黄色视频在线观看| 操美女的视频在线观看| 在线永久观看黄色视频| 中文字幕av电影在线播放| 免费观看av网站的网址| 亚洲三区欧美一区| 老司机午夜十八禁免费视频| 精品人妻在线不人妻| 一级毛片女人18水好多| 黄频高清免费视频| 黑人巨大精品欧美一区二区mp4| 最黄视频免费看| 欧美精品高潮呻吟av久久| 国产高清国产精品国产三级| 色94色欧美一区二区| 在线十欧美十亚洲十日本专区| 国产黄色免费在线视频| 国产深夜福利视频在线观看| 亚洲第一欧美日韩一区二区三区 | 大香蕉久久网| 成年人午夜在线观看视频| 欧美精品一区二区免费开放| 精品亚洲乱码少妇综合久久| av一本久久久久| 在线天堂中文资源库| 亚洲专区字幕在线| 丝袜人妻中文字幕| 久久人人97超碰香蕉20202| 亚洲综合色网址| 99re6热这里在线精品视频| 久久国产亚洲av麻豆专区| 狠狠狠狠99中文字幕| 久久久精品区二区三区| 日韩大片免费观看网站| 蜜桃在线观看..| 大片免费播放器 马上看| 久久久久久久久久久久大奶| 欧美亚洲日本最大视频资源| 亚洲第一欧美日韩一区二区三区 | 色94色欧美一区二区| 精品福利观看| 国产国语露脸激情在线看| 国产真人三级小视频在线观看| 亚洲国产精品一区三区| 亚洲av日韩精品久久久久久密| 天天躁日日躁夜夜躁夜夜| 69av精品久久久久久 | 岛国毛片在线播放| 免费日韩欧美在线观看| 一区二区三区精品91| 国产精品影院久久| 黑人猛操日本美女一级片| 女性生殖器流出的白浆| 亚洲国产精品成人久久小说| 中文欧美无线码| 久久久国产欧美日韩av| 人人澡人人妻人| 久久人妻熟女aⅴ| 999久久久精品免费观看国产| 成人国语在线视频| 男女床上黄色一级片免费看| 一本大道久久a久久精品| 成人手机av| 亚洲少妇的诱惑av| 国产一区二区 视频在线| 欧美日韩亚洲综合一区二区三区_| 97精品久久久久久久久久精品| 日韩制服骚丝袜av| 亚洲精品一二三| 一区二区三区乱码不卡18| 一区二区三区精品91| 日本91视频免费播放| 青青草视频在线视频观看| 成年美女黄网站色视频大全免费| 亚洲精品在线美女| 大码成人一级视频| 日韩三级视频一区二区三区| 97人妻天天添夜夜摸| 女警被强在线播放| 他把我摸到了高潮在线观看 | 男人舔女人的私密视频| 一级毛片电影观看| 国产av精品麻豆| 国产亚洲一区二区精品| 大码成人一级视频| www.av在线官网国产| 国产精品久久久久久精品电影小说| 操出白浆在线播放| 在线观看免费视频网站a站| 日本av手机在线免费观看| 亚洲七黄色美女视频| 亚洲国产成人一精品久久久| 一级毛片电影观看| 丝袜美腿诱惑在线| 性少妇av在线| 日本精品一区二区三区蜜桃| 成年人午夜在线观看视频| 一进一出抽搐动态| 久久久欧美国产精品| 咕卡用的链子| 国产av又大| 久久狼人影院| 大片免费播放器 马上看| 欧美日韩成人在线一区二区| 国产日韩欧美在线精品| 国产成人免费无遮挡视频| 亚洲av国产av综合av卡| 天天躁狠狠躁夜夜躁狠狠躁| 一区二区三区四区激情视频| 中亚洲国语对白在线视频| 国产深夜福利视频在线观看| 久久热在线av| 国产成人精品无人区| 日韩欧美国产一区二区入口| 搡老乐熟女国产| 精品免费久久久久久久清纯 | 精品国产超薄肉色丝袜足j| 精品欧美一区二区三区在线| 成人免费观看视频高清| 精品少妇一区二区三区视频日本电影| 一本色道久久久久久精品综合| 在线天堂中文资源库| 亚洲欧美日韩另类电影网站| 爱豆传媒免费全集在线观看| 亚洲精品美女久久av网站| 一二三四在线观看免费中文在| 久久久久久亚洲精品国产蜜桃av| 国产一区二区三区综合在线观看| 狂野欧美激情性bbbbbb| 一本色道久久久久久精品综合| 亚洲精品国产精品久久久不卡| 国产亚洲av高清不卡| 国产成人欧美在线观看 | 一本一本久久a久久精品综合妖精| 美国免费a级毛片| 亚洲欧美一区二区三区黑人| 亚洲精品一卡2卡三卡4卡5卡 | 99久久综合免费| 欧美xxⅹ黑人| 久久人人爽人人片av| 在线观看免费午夜福利视频| 一个人免费看片子| 国产人伦9x9x在线观看|